Safely removes sensitive information from pfSense config.xml exports
Project description
pfSense XML Configuration Redactor
The pfSense XML Configuration Redactor safely removes sensitive information from config.xml exports before they are shared with support, consultants, auditors, or AI tools for security analysis.
Installation
From PyPI (recommended)
pip install pfsense-redactor
Note: If you encounter an
externally-managed-environmenterror (common on macOS and modern Linux distributions), use one of these alternatives:Option 1: Install with pipx (recommended for CLI tools)
brew install pipx pipx install pfsense-redactorOption 2: Use a virtual environment
python3 -m venv venv source venv/bin/activate pip install pfsense-redactorOption 3: Install in user space
pip install --user pfsense-redactor
From Source
git clone https://github.com/grounzero/pfsense-redactor.git
cd pfsense-redactor
Option 1: Development mode (recommended for contributing)
pip install -e .
Option 2: With virtual environment
python3 -m venv venv
source venv/bin/activate
pip install -e .
The tool preserves network architecture and routing logic whilst sanitising secrets and identifiers allowing safe troubleshooting and topology review without disclosing private data.
Keeps firewall and routing context
Removes passwords, keys, public IPs (optional), tokens, certs
Supports anonymisation for consistent placeholder mapping
Understands pfSense config structures, namespaces, VPNs, WireGuard, XML attributes, IPv6 zone IDs
Features
Protects real secrets
- Passwords & encrypted passwords
- Pre-shared keys (IPSec, OpenVPN, WireGuard)
- TLS/OpenVPN static keys & certs
- SNMP community strings
- LDAP / RADIUS secrets
- API keys & tokens
- PEM blocks (RSA / EC / OpenSSH)
Preserves network logic
- Subnets & masks (255.x.x.x always preserved)
- Router topology
- VLAN and VPN interfaces
- Firewall rules and gateways
Smart redaction
| Data | Behaviour |
|---|---|
| Internal IPs | Preserve with --keep-private-ips |
| Public IPs | Mask or anonymise |
| Email addresses | Mask or anonymise |
| URLs | Preserve structure, mask hostname |
| MAC addresses | Mask format-preserving |
| Certificates | Collapse to [REDACTED_CERT_OR_KEY] |
Operational modes
| Mode | Purpose |
|---|---|
| Default | Safe redaction for sharing logs |
--keep-private-ips |
Preserve private IPs (best for support/AI) |
--anonymise |
Replace identifiers with consistent placeholders (IP_1, domain3.example) |
--aggressive |
Scrub all fields (plugins/custom XML) |
Requirements
- Python 3.8+
Usage
Basic usage
# Output filename auto-generated as config-redacted.xml
pfsense-redactor config.xml
# Or specify output filename explicitly
pfsense-redactor config.xml redacted.xml
Preserve private IPs (recommended)
pfsense-redactor config.xml redacted.xml --keep-private-ips
Allow-list specific IPs and domains
# Preserve specific public services (never redact)
pfsense-redactor config.xml --allowlist-ip 8.8.8.8 --allowlist-domain time.nist.gov
# Preserve entire CIDR ranges
pfsense-redactor config.xml --allowlist-ip 203.0.113.0/24
# Use an allow-list file (supports IPs, CIDRs, and domains)
pfsense-redactor config.xml --allowlist-file my-allowlist.txt
Topology-safe anonymisation
pfsense-redactor config.xml redacted.xml --anonymise
Allow internal DNS names
pfsense-redactor config.xml redacted.xml --no-redact-domains --keep-private-ips
Aggressive mode
pfsense-redactor config.xml redacted.xml --aggressive
Dry run
# Show statistics only
pfsense-redactor config.xml --dry-run
# Show statistics with sample redactions (safely masked)
pfsense-redactor config.xml --dry-run-verbose
Output to STDOUT
pfsense-redactor config.xml --stdout > redacted.xml
In-place (danger)
pfsense-redactor config.xml --inplace --force
Command-Line Flags Reference
Version & Help
| Flag | Description |
|---|---|
--version |
Show program version and exit |
--check-version |
Check for updates from PyPI |
-h, --help |
Show help message and exit |
Input/Output
| Flag | Description |
|---|---|
input |
Input pfSense config.xml file (positional argument) |
output |
Output redacted config.xml file (positional argument, optional with --stdout/--dry-run/--inplace) |
--stdout |
Write redacted XML to stdout instead of file |
--inplace |
Overwrite input file with redacted output (use with caution) |
--force |
Overwrite output file if it already exists |
--allow-absolute-paths |
Allow absolute file paths (relative paths only by default for security) |
Redaction Modes
| Flag | Description |
|---|---|
--keep-private-ips |
Keep non-global IP addresses visible (RFC1918/ULA/loopback/link-local). Netmasks and unspecified addresses (0.0.0.0, ::) always preserved |
--no-keep-private-ips |
When used with --anonymise, do NOT keep private IPs visible (mask all IPs) |
--anonymise |
Use consistent aliases (IP_1, domain1.example) to preserve network topology. Implies --keep-private-ips unless --no-keep-private-ips specified |
--aggressive |
Apply IP/domain redaction to all element text, not just known fields |
--no-redact-ips |
Do not redact IP addresses |
--no-redact-domains |
Do not redact domain names |
--redact-url-usernames |
Redact usernames in URLs (default: preserve usernames, always redact passwords) |
Allow-lists
| Flag | Description |
|---|---|
--allowlist-ip IP_OR_CIDR |
IP address or CIDR network to never redact (repeatable). Applies to text and URLs |
--allowlist-domain DOMAIN |
Domain to never redact (repeatable, case-insensitive, supports suffix matching). Applies to bare FQDNs and URL hostnames |
--allowlist-file PATH |
File containing IPs, CIDR networks, and domains to never redact (one per line) |
--no-default-allowlist |
Do not load default allow-list files (.pfsense-allowlist in current dir or ~/.pfsense-allowlist) |
Testing & Diagnostics
| Flag | Description |
|---|---|
--dry-run |
Show statistics only, do not write output file |
--dry-run-verbose |
Show statistics with sample redactions (safely masked to prevent leaks) |
--fail-on-warn |
Exit with non-zero code if root tag is not 'pfsense' (useful in CI) |
Output Control
| Flag | Description |
|---|---|
-q, --quiet |
Suppress progress messages (show only warnings and errors) |
-v, --verbose |
Show detailed debug information |
Allow-lists
Allow-lists let you preserve specific well-known IPs and domains that don't leak private information.
Default allow-list files
The tool automatically loads allow-lists from these locations (if they exist):
.pfsense-allowlistin current directory~/.pfsense-allowlistin home directory
To disable: use --no-default-allowlist
Allow-list file format
Create .pfsense-allowlist or use --allowlist-file:
# Comments start with #
# One item per line (IP, CIDR, or domain)
# Public DNS servers
8.8.8.8
1.1.1.1
# Cloud provider ranges
203.0.113.0/24
198.51.100.0/24
# NTP servers (suffix matching: preserves time.nist.gov and *.time.nist.gov)
time.nist.gov
pool.ntp.org
# Wildcard domains (*.example.org preserves all subdomains)
*.pfsense.org
See allowlist.example for a complete template.
CLI allow-list flags
# Add specific IPs or CIDR ranges (repeatable)
--allowlist-ip 8.8.8.8 --allowlist-ip 203.0.113.0/24
# Add specific domains (repeatable, case-insensitive, supports suffix matching)
--allowlist-domain time.nist.gov --allowlist-domain pool.ntp.org
# Load from file (supports IPs, CIDRs, and domains)
--allowlist-file /path/to/allowlist.txt
# Disable default file loading
--no-default-allowlist
Features:
- CIDR support:
203.0.113.0/24preserves all IPs in that range - Suffix matching:
example.orgpreservessub.example.org,db.corp.example.org, etc. - Wildcard domains:
*.example.orgis equivalent to suffix matching onexample.org - IDNA/punycode: Automatically handles internationalised domains (e.g.,
bücher.example↔xn--bcher-kva.example) - Merged sources: All CLI flags, files, and default files are combined
Note: Items in allow-lists are never redacted in:
- Raw text IP/domain references
- URL hostnames
- Bare FQDNs
Example
Input
<openvpn>
<server>
<local>192.168.10.1</local>
<tlsauth>-----BEGIN OpenVPN Static key-----ABC123...</tlsauth>
<remote>198.51.100.10</remote>
<remote_port>443</remote_port>
</server>
</openvpn>
Output (--keep-private-ips)
<openvpn>
<server>
<local>192.168.10.1</local>
<tlsauth>[REDACTED]</tlsauth>
<remote>XXX.XXX.XXX.XXX</remote>
<remote_port>443</remote_port>
</server>
</openvpn>
Output (--anonymise)
<openvpn>
<server>
<local>IP_1</local>
<tlsauth>[REDACTED]</tlsauth>
<remote>IP_2</remote>
<remote_port>443</remote_port>
</server>
</openvpn>
Security Notes
Never restore the redacted file to pfSense.
Redacted output is for analysis only, because:
- CDATA and comments are removed by XML parser
- PEM blocks and binary data are collapsed
- Some optional metadata fields may be stripped
Always keep the original secure copy.
Path Security
The tool includes built-in protections against malicious file path operations:
Default behaviour (secure):
- Only relative paths are allowed by default
- Directory traversal (
../../../etc/passwd) is blocked - Paths with null bytes are rejected
- Writing to system directories (
/etc,/sys,/proc,/Windows/System32, etc.) is blocked - Safe locations (home directory, current working directory, temp directories) are automatically allowed
Using --allow-absolute-paths:
- Enables absolute paths for intentional use cases
- Still blocks writes to sensitive system directories
- Still blocks directory traversal attempts
- Useful when you need to specify full paths explicitly
Examples:
# Safe: relative path (default)
pfsense-redactor config.xml output.xml
# Blocked: absolute path without flag
pfsense-redactor /etc/config.xml output.xml
# Error: Absolute paths not allowed (use --allow-absolute-paths)
# Blocked: directory traversal
pfsense-redactor ../../../etc/passwd output.xml
# Error: Path contains directory traversal components (..)
# Blocked: writing to system directory (even with flag)
pfsense-redactor config.xml /etc/output.xml --allow-absolute-paths
# Error: Cannot write to sensitive system directory
# Allowed: absolute path to safe location with flag
pfsense-redactor ~/config.xml ~/output.xml --allow-absolute-paths
# Blocked: in-place editing of system files
pfsense-redactor /etc/hosts --inplace --force --allow-absolute-paths
# Error: Cannot use --inplace with this file
Protected system directories:
- Unix/Linux:
/etc,/sys,/proc,/dev,/boot,/root,/bin,/sbin,/usr/bin,/usr/sbin,/lib,/lib64,/var/log,/var/run,/tmp,/run - Windows:
C:\Windows,C:\Windows\System32,C:\Program Files,C:\ProgramData - Critical files:
/etc/passwd,/etc/shadow,/etc/sudoers, etc.
Testing
Dry run summary
# Statistics only
pfsense-redactor config.xml --dry-run
# Statistics with sample redactions (safely masked to avoid leaks)
pfsense-redactor config.xml --dry-run-verbose
Sample output with --dry-run-verbose:
[+] Redaction summary:
- Passwords/keys/secrets: 10
- Certificates: 6
- IP addresses: 26
- Domain names: 47
[+] Samples of changes (limit N=5):
IP: 198.51.***.42 → XXX.XXX.XXX.XXX
IP: 2001:db8:*:****::1 → XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX
URL: https://198.51.***.42/admin → https://XXX.XXX.XXX.XXX/admin
FQDN: db.***.example.org → example.com
MAC: aa:bb:**:**:ee:ff → XX:XX:XX:XX:XX:XX
Secret: p****************d (len=18) → [REDACTED]
Cert/Key: PEM blob (len≈2048) → [REDACTED_CERT_OR_KEY]
Sample masking policy (prevents leaks in dry-run output):
- IP: Keep first and last octet/segment, mask middle (e.g.,
198.51.***.42) - URL: Show full URL but mask host as above
- FQDN: Keep TLD and one left label, mask rest (e.g.,
db.***.example.org) - MAC: Mask middle octets (e.g.,
aa:bb:**:**:ee:ff) - Secret: Show length and first/last 2 chars only (e.g.,
p****************d (len=18)) - Cert/Key: Just show placeholder with length (e.g.,
PEM blob (len≈2048))
Recommended test flags
| Purpose | Command |
|---|---|
| Support & AI review | --keep-private-ips --no-redact-domains |
| Topology map w/o identifiers | --anonymise |
| Nuke everything | --aggressive |
Stats example
[+] Redaction summary:
- Passwords/keys/secrets: 4
- Certificates: 2
- IP addresses: 11
- MAC addresses: 3
- Domain names: 5
- Email addresses: 1
- URLs: 2
Contributing
Pull requests welcome. Particularly:
- Additional pfSense element coverage
- Plugin XML tag packs (WireGuard, pfBlockerNG, HAProxy, Snort, ACME, FRR)
- Unit test configs
Licence
MIT
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file pfsense_redactor-1.0.9.tar.gz.
File metadata
- Download URL: pfsense_redactor-1.0.9.tar.gz
- Upload date:
- Size: 200.9 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
175d95faa3fcf842db0c243e770efb145cbdb94cf7c3b64bb82f8a3534e32e22
|
|
| MD5 |
d87df89152032b672a89bae268f4d9af
|
|
| BLAKE2b-256 |
dfef365417593b4e07c6818060d2c268f3a5fe80d4c59bb65b39090b28eb95ba
|
Provenance
The following attestation bundles were made for pfsense_redactor-1.0.9.tar.gz:
Publisher:
python-publish.yml on grounzero/pfsense-redactor
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
pfsense_redactor-1.0.9.tar.gz -
Subject digest:
175d95faa3fcf842db0c243e770efb145cbdb94cf7c3b64bb82f8a3534e32e22 - Sigstore transparency entry: 685006533
- Sigstore integration time:
-
Permalink:
grounzero/pfsense-redactor@55c5556fe9605239b95f0e7fc60dd29bc59dea05 -
Branch / Tag:
refs/tags/1.0.9 - Owner: https://github.com/grounzero
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
python-publish.yml@55c5556fe9605239b95f0e7fc60dd29bc59dea05 -
Trigger Event:
release
-
Statement type:
File details
Details for the file pfsense_redactor-1.0.9-py3-none-any.whl.
File metadata
- Download URL: pfsense_redactor-1.0.9-py3-none-any.whl
- Upload date:
- Size: 33.1 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
8b0afaa9efb25502bd008f3fc966c42d1250c0a551ebcfd5f48d178d18b8262c
|
|
| MD5 |
8c731c4470ffc37dd8b5cefdae879df4
|
|
| BLAKE2b-256 |
e67bd88ef36ad3d299ca0ee96a65a18053417a8abfee854d4ccb58f6f57a995c
|
Provenance
The following attestation bundles were made for pfsense_redactor-1.0.9-py3-none-any.whl:
Publisher:
python-publish.yml on grounzero/pfsense-redactor
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
pfsense_redactor-1.0.9-py3-none-any.whl -
Subject digest:
8b0afaa9efb25502bd008f3fc966c42d1250c0a551ebcfd5f48d178d18b8262c - Sigstore transparency entry: 685006535
- Sigstore integration time:
-
Permalink:
grounzero/pfsense-redactor@55c5556fe9605239b95f0e7fc60dd29bc59dea05 -
Branch / Tag:
refs/tags/1.0.9 - Owner: https://github.com/grounzero
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
python-publish.yml@55c5556fe9605239b95f0e7fc60dd29bc59dea05 -
Trigger Event:
release
-
Statement type: